Introduction to Cryptography: Public-­Key Cryptography

Описание к видео Introduction to Cryptography: Public-­Key Cryptography

This tutorial introduces public keys in asymmetric cryptographic models that exploit the discrete log problem, like the Diffie–Hellman, ElGamal and elliptic curve systems. Model man-in-the-middle attacks, compare symmetric cryptosystems and preview digital signatures, which will be covered in more depth in the next lesson.

In the full course, you will learn how and when to use hash functions and symmetric and asymmetric ciphers, as well as the basics of information security through instruction on the fundamentals and real-life applications of each concept.

#wolfram #cryptography #learning #course #informationsecurity #steganography #encryption

Комментарии

Информация по комментариям в разработке